Our Services

Absolute Risk Management provides security risk and design services across the Middle East and Africa, supporting organisations operating in complex, high-risk, and often austere environments.

The firm was established on a simple premise: too much of the security industry has become reliant on formulaic products, standard templates, and recommendations divorced from the operating reality of the site in question. After more than 30 years working across military, government, and international corporate settings, that gap has become all too familiar. Reports get produced, risks get listed, systems get specified, and too often, none of it is properly aligned to the actual threat, the real vulnerability, or the client's ability to implement anything.

Absolute Risk Management was formed to provide something more rigorous. Its work is grounded in direct experience and operational realism, and a flat refusal to produce something that won't hold up when tested.

The services below reflect that approach:

Street market with baskets of spices, pottery, and handwoven goods, vendors selling items under umbrellas, pedestrians walking, and buildings with wooden shutters and awnings in warm sunlight.
A busy urban street scene with people walking, palm trees, cars, and shops. In the background, there is a mosque with a tall minaret and modern high-rise buildings surrounding it.

Security Surveys

A security survey establishes the physical and operational condition of an office, site, facility, critical asset or residence. The purpose is to determine how existing security measures perform in practice, where the weaknesses lie, and what needs to be addressed.

This includes review of perimeter integrity, access and egress arrangements, surveillance coverage, lighting, guarding, patrol functions, control points, supporting infrastructure, and the general condition of physical and technical measures already in place.

Absolute Risk Management provides two forms of survey.

  • Remote Survey

Based on available drawings, imagery, photographs, previous reports, and client-supplied material. It offers a limited but useful review where access is constrained, or where a baseline picture is needed before committing to full on-site work.

  • Full On-Site Survey

A detailed inspection of the location itself. This allows for direct review of the operating environment, the effectiveness of current measures, and the vulnerabilities that only become apparent through physical inspection and professional judgement on the ground.

The purpose of either approach is the same: to give the client a clear, honest picture of where they actually stand, and what needs to change. (Surveys conducted in the UAE are carried out with reference to applicable SIRA and civil defence requirements, ensuring outputs are aligned to both operational and regulatory standards).

Hotel Security Assessments

Absolute Risk Management undertakes hotel security assessments to support the safety of business travellers and to provide corporate security managers with a clear level of assurance that accommodation options have been subject to structured review.

For many organisations, hotel selection is treated as an administrative matter. In practice, it is a security issue. Business travellers may be placed in unfamiliar environments, operating in cities or regions where crime, civil disturbance, surveillance, terrorism, or general instability present a credible concern.

Brand name and a good TripAdvisor score don't tell you whether the lobby can be controlled, whether the lifts are monitored, or whether the guard force has any real capability. We do.

The assessment covers everything that matters in practice, how the building is accessed and by whom, how the perimeter and lobby are controlled, what the CCTV coverage actually achieves, how the guard force is deployed and to what standard, and whether the emergency and incident response arrangements would function under pressure. (For organisations operating in the UAE, assessments are conducted with reference to SIRA (Security Industry Regulatory Agency) requirements and relevant MOI standards, providing an additional layer of regulatory assurance).

Consideration is also given to the management of public access, contractor access, loading areas, and the separation of guest and service functions where relevant.

The output gives corporate security managers a clear, documented basis for hotel approval decisions, and the due diligence evidence they need if that decision is ever questioned.

Security Risk Assessments

Security Risk Assessments are undertaken to determine the threat, vulnerability, and consequence profile of the site, operation, or asset under review.

The process begins with the identification of the assets requiring protection. These may include personnel, infrastructure, production facilities, technical systems, utilities, or information — anything the organisation cannot afford to lose or have compromised. Once identified, the assessment considers the range of relevant threats, whether malicious, criminal, hostile, opportunistic, or otherwise disruptive.

From there, the review turns to vulnerability. This includes weaknesses in physical security, procedural control, technical systems, manpower, governance, supervision, and response capability. Consideration is then given to the likely effect of a successful incident, including safety impact, operational disruption, financial loss, reputational damage, or interruption to critical activity.

The final output is not a generic matrix or theoretical exercise. It is a risk-based assessment supported by professional analysis and set out in terms that allow the client to take informed decisions. Mitigations are identified, prioritised, and sized to what the client can actually implement — not what looks good on paper.

System and Operational Requirements

Once the risk position is understood, the next stage is to define the system and operational requirements necessary to protect the identified asset properly.

This work is undertaken on an asset basis. It sets out what is required — both from a technical standpoint and from an operational one — so that the client knows exactly what is needed, and why, before any capital is committed or design work begins.

The technical requirement may include surveillance systems, access control, perimeter intrusion detection, alarms, communications, monitoring capability, and command platform requirements. The operational requirement considers the manpower model, guarding arrangements, patrol activity, operating procedures, escalation, reporting, supervision, and response.

It also recognises that security rarely sits in isolation. Client teams, operators, regulators, host nation authorities, and third parties all have a bearing on what can realistically be specified and delivered.

The purpose of this service is to define the requirement clearly before capital is committed and before design work progresses beyond broad concept.

The outputs are also structured with the internal conversation in mind. Security teams operating in this region often know exactly what's needed, the harder job is making the case to finance and leadership who don't share that context. Clear, evidence-based documentation makes that conversation easier and removes the ambiguity that cost-focused decision makers exploit.

Conceptual Security Design Proposal

Absolute Risk Management develops high-level conceptual design proposals for pre-identified assets, based upon the findings of the survey, the risk assessment, and the defined system and operational requirements.

The aim is to produce a risk-based design concept that can be submitted for consideration by the client and relevant internal and external stakeholders. This is not a final engineering design, nor a procurement pack. It is a structured design proposal intended to show the appropriate security direction for the asset in question.

The conceptual design may include perimeter treatment, checkpoint arrangement, access control measures, surveillance coverage, intrusion detection, guard infrastructure, control room oversight, and the broader integration of physical, technical, and operational measures.

Each proposal is developed against what the threat actually requires, what the site can realistically support, and what the operating environment demands. Nothing is carried over from another project.

What You Will Receive

At the end of any engagement, the client has something tangible: a clear picture of the current security position, a risk-based assessment they can stand behind, defined requirements that can be taken into design and procurement, and — where required — a conceptual design direction ready for further development.

These are not theoretical outputs. They are tools. Built to be used.

The security industry has a habit of solving simple problems expensively… We don't.

If the right answer is straightforward, that is what gets recommended, regardless of what it costs us. A good security recommendation should also be understood by the person responsible for implementing it. If it requires a manual to explain, it probably needs rethinking.